US7483986B2 - Dynamically tuning networks of relationships in self-organizing multi-agent systems - Google Patents
Dynamically tuning networks of relationships in self-organizing multi-agent systems Download PDFInfo
- Publication number
- US7483986B2 US7483986B2 US10/726,724 US72672403A US7483986B2 US 7483986 B2 US7483986 B2 US 7483986B2 US 72672403 A US72672403 A US 72672403A US 7483986 B2 US7483986 B2 US 7483986B2
- Authority
- US
- United States
- Prior art keywords
- topology
- agents
- agent
- tuner
- relationships
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/04—Network management architectures or arrangements
- H04L41/042—Network management architectures or arrangements comprising distributed management centres cooperatively managing the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/04—Network management architectures or arrangements
- H04L41/046—Network management architectures or arrangements comprising network management agents or mobile agents therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
Definitions
- This invention relates generally to data processing systems and networks that include a plurality of autonomous software agents capable of self-organizing behavior resulting in the formation of inter-agent relationships and, more specifically, this invention relates to methods and apparatus for optimizing or tuning a topology of inter-agent relationships.
- agents In multi-agent systems, agents form relationships among themselves according to their own internal preferences and decision-making logic. In general, there is no “dictator” function that determines the inter-relationships between agents. This level of self-organization is one of the defining features of multi-agent systems, and one of the most valuable.
- the topology of the web of inter-agent relationships exhibit certain globally-defined properties. This is especially true if the multi-agent system is under the nominal administration of a single entity, such as a corporation, or was configured to solve some cooperative problem.
- so-called “random” networks such as the network of physical internet routers, in which the degree-distribution of nodes roughly follows a bell-curve, are relatively robust against targeted attacks on nodes, because the ill effects of the failure of any one node is approximately the same for all nodes.
- a “scale-free network” is any network of relationships in which the degree-distribution of the nodes is characterized by a power law.
- the “degree” of a node denotes the number of connections a given node has with other nodes, i.e., the number of relationships (or relationships of a given type) that a given node is in.
- the histogram of node-degrees has the feature that relatively fewer nodes are found to have relatively higher degrees, with the overall relationship following a power-law curve.
- the overall desired network topology can change with time. For example, during typical functioning it is desirable for the system to maintain robustness against random failure; but in the event of a real or an expected attack, it would be even more desirable for the system to instead protect itself against the attack. For this to occur the system should exhibit an ability to continually adjust the statistical properties of the network topology.
- this invention provides a data processing system that includes a plurality of self-organizing software agents capable of autonomously establishing relationships between themselves, where the totality of the relationships can be represented by a topological structure having nodes that each comprise one of the plurality of software agents and links between the nodes that comprise the established relationships.
- the data processing system further includes a topology tuning function that obtains information that is descriptive of the topology and, based at least in part on the obtained information and on at least one criterion, that makes one or more recommendations to at least one of the plurality of software agents that is intended to modify the topology.
- the topology tuning function is performed by a topology tuner software agent, while in another embodiment the topology tuning function forms a part of a system hosting function, such as a part of the operating system or other system software (e.g., an application server such as one known as the WebSphereTM Application Server that is available from the assignee of this patent application.)
- a system hosting function such as a part of the operating system or other system software (e.g., an application server such as one known as the WebSphereTM Application Server that is available from the assignee of this patent application.)
- this invention provides, in a data processing system, a method to automatically tune a topology of relationships between a plurality of self-organizing agents.
- the method includes obtaining information that is descriptive of the topology and, based at least in part on the obtained information and on at least one criterion, making one or more recommendations to at least one of the plurality of agents that is intended to modify the topology of relationships between the plurality of self-organizing agents.
- This information may be obtained by the topology tuner agent by querying a system registry to determine identities of individual ones of the plurality of agents, and possibly also relationship information between the agents, and/or by querying individual ones of the plurality of agents to determine to which other agent or agents the individual one of the plurality of agents currently has a relationship.
- this invention provides a topology tuner software agent operable in a data processing system that includes the plurality of self-organizing software agents.
- the topology tuner software agent includes computer program code for obtaining information that is descriptive of a topology of relationships between the self-organizing software agents from a system registry function or from the self-organizing software agents themselves; and also computer program code that is responsive to the obtained information and at least one criterion, for making at least one recommendation to at least one of the plurality of self-organizing software agents that is intended to modify the topology.
- Obtaining information can be performed periodically by topology tuner software agent to update the state of the topology, and the topology tuner software agent can make the recommendation when some topology threshold condition is satisfied.
- the at least one criterion may be a vulnerability of the topology to an attack directed to one or more of the self-organizing software agents, a vulnerability of the topology to a failure of one or more of the self-organizing software agents, and/or a rate at which the self-organizing software agents form new relationships.
- FIG. 1 is a simplified block diagram showing an unevenly-distributed topology of agent relationships, and a topology tuner agent in accordance with this invention
- FIG. 2 is a logic flow diagram showing a tuner agent life cycle
- FIG. 3 is a logic flow diagram showing a process whereby the tuner agent gathers topology-related information
- FIG. 4 is a logic flow diagram showing a process whereby the tuner agent tunes the unevenly-distributed topology of agent relationships
- FIG. 5 is a logic flow diagram showing a process whereby the tuner agent determines when to begin another topology tuning cycle.
- FIG. 1 shows a multi-agent system 10 containing a topology tuner agent 20 , a registry service 30 , a directory service 50 and worker agents collectively referred to as agents 40 , and designated individually as A 01 -A 13 , B 1 and B 2 . All agents 40 are assumed to be registered with the registry service 30 . The relationships between the worker agents 40 are indicated by the lines connecting the agents which, for the purposes of this invention, is considered to represent a topology of agent inter-relationships. In this non-limiting example A 01 -A 12 are in a relationship with B 1 , which implies that the system 10 is extremely vulnerable to an attack directed against B 1 .
- the robustness of the system 10 to a targeted attack would be significantly increased if approximately half of the agents A 01 -A 13 were in a relationship with B 1 , and the other half were in a relationship with B 2 .
- the tuner agent 20 operates to detect this imbalance in agent relationships, and further operates to re-balance, or tune, the resulting agent relationship topology so as to reduce the vulnerability of the system 10 to failure or malicious attack.
- FIG. 2 shows the major steps in the life cycle of the topology tuner agent 20
- FIGS. 3-5 shows the operation of these major steps in greater detail.
- the topology tuner agent 20 Upon starting, at Block 210 the topology tuner agent 20 first obtains information about the current topology of relationships in the system 10 . This may take the form of an exhaustive list of all relationships between agents 40 in the system 10 , possibly labeled with identifiers to distinguish between different types of relationship. This information can be conveniently represented as a graph in which the agents 40 are nodes and relationships are arcs connecting nodes. Alternatively, the topology information may be represented by statistical measures of system topology, such as the distribution of the number relationships the agents 40 have. For example, the topology tuner agent 20 may construct a histogram of the number of relationships the agents 40 are in.
- the topology tuner agent 20 compares the shape of the histogram against two alternative representations, the Gaussian distribution and the power-law distribution, using conventional statistical curve-fitting techniques. The closer the histogram is to a Gaussian distribution, the more “random” is the topology, while histograms that resemble the power-law distribution indicate a scale-free topology. A preferred method of gathering this topology information is shown in FIG. 3 , and is discussed below.
- the topology tuner agent 20 determines what type of tuning should be performed. This may be accomplished by starting with a high-level policy or goal, such as might be set by a system administrator, and calculating characteristics of the desired topology, and then comparing those characteristics with the characteristics of the measured topology. For example, the system administrator might specify that robustness under random node failure is a goal.
- the topology tuner agent 20 takes this predetermined goal and identifies a desired topology that most closely matches the topology required to achieve the goal, in this example a random graph. This implies that the topology tuner agent 20 attempts to achieve a normal or Gaussian distribution of connections per node (i.e., per each agent 40 ).
- mapping does not require a general purpose mapping between high-level goals and topological characteristics. It is sufficient for this invention to have the mapping be even so simple as a set of hand-coded rules that apply to different predefined goals.
- the topology tuner agent 20 contacts at least some of the agents 40 in the system 10 and directs them to modify their relationships in a particular way. This can be done in a multi-cast fashion, in which the topology tuner agent 20 sends the same message to all agents 40 at once; or it may be done in a more individualized, single-cast fashion, in which the agents 40 are contacted one by one, and each one potentially receives a different recommendation from the topology tuner agent 20 .
- FIG. 4 shows a preferred method of carrying out this procedure.
- the topology tuner agent 20 determines at Block 240 whether re-tuning is necessary.
- Re-tuning is necessary in general to deal with two kinds of change, both of which may occur at any time: (a) the desired topology may change in such a way that the current topology is no longer desirable, or (b) the actual topology may change in such a way that it no longer has the desired characteristics.
- the former may occur, for example, if the system administrator changes the primary goal from “stability under random failure” to “security against future targeted attack”.
- the latter may occur, for example, because the agents 40 in the system 10 change their relationships, or due to a failure of one or more agents 40 .
- topology tuner agent 20 determines that re-tuning is necessary, control passes back to Block 220 , otherwise the topology tuner agent 20 continues at Block 250 by monitoring the system topology and updating the topology information (possibly after a delay), and redetermining whether re-tuning is necessary.
- FIG. 5 A preferred method of determining whether re-tuning is necessary and of updating the topology information is shown in FIG. 5 .
- FIG. 3 illustrates a preferred method whereby the topology tuner agent 20 gathers information about the topology of the system 10 .
- the topology tuner agent 20 determines whether the topology information it needs is already available from another component in the system 10 .
- a preferred technique for storing this information is by means of a “relationship registry”.
- a relationship registry is an agent or service that keeps track of the relationships between the agents 40 in the system 10 . Relationship registries have many uses beyond that of the tuning of relationships in accordance with this invention: for example, they are useful for certain methods of performing fast detection and diagnosis of problems in the system 10 . For this reason, there is at least the possibility that the relationship information needed by the topology tuner agent 20 has already been gathered.
- the topology tuner agent 20 contacts at Block 310 the directory service 50 and requests information about relationship registries in the system 10 . If the directory service 50 returns the requested information at Block 320 , the topology tuner agent 20 selects one or more of the registries (such as the Registry Service 30 shown in FIG. 1 ) and obtains at Block 330 the desired information about the topology of the relationships between the agents 40 . If, however, there is no relationship registry service 30 present in the system 10 , the topology tuner agent 20 instead directly gathers the topology information. This is preferably accomplished by obtaining at Block 340 a list of agents 40 to contact, and then at Block 350 contacting each agent 40 in the list and requesting from that agent the information that describes its relationships with other agents in the system 10 .
- the directory service 50 returns the requested information at Block 320
- the topology tuner agent 20 selects one or more of the registries (such as the Registry Service 30 shown in FIG. 1 ) and obtains at Block 330 the desired information about the topology of the relationships between the
- the topology tuner agent 20 at Block 360 is enabled to calculate statistical measures of the system topology. For example, the topology tuner agent 20 may calculate the observed distribution in the number of relationships held by the agents 40 . In the case where there are multiple types of relationships present in the system 10 , the topology tuner agent 20 may calculate a distribution for each type of relationship.
- FIG. 3 describes a presently preferred technique for gathering the topology information by the topology tuner agent 20 .
- the topology tuner agent 20 may make use of the central registry 30 and/or the directory 50 in which information about the relationships of the agents 40 is stored. It is preferred that the registry 30 be kept up to date in some manner, such as by periodically receiving updates from the agents 40 , or by periodically polling the agents 40 .
- the agents 40 may inform the topology tuner agent 20 whenever their relationships change; or the agents 40 may inform the relationship registry 30 , which in turn informs the topology tuner agent 20 , or the topology tuner agent 20 may poll the agents 40 , or the relationship registry 30 . Combinations of these techniques can be used as well.
- FIG. 4 shows a presently preferred method whereby the topology tuner agent 20 performs the tuning the system 10 topology in a single operation.
- the topology tuner agent 20 obtains a general recommendation describing what type of tuning is to be preformed.
- the topology tuner agent 20 obtains, such as from the directory service 50 , a list of agents 40 to make the recommendation to. This could be the entire population of agents 40 , or a subset of the population for which a sub-graph topology is to be tuned. Alternatively, the list of agents 40 may comprise a subset of the population selected by relationship type, if the recommendation only applies to certain types of relationship.
- the topology tuner agent 20 enters a loop to contact the agents on the list. If at Block 430 it finds that the list is empty, the topology tuner agent 20 exits the loop and this instance of the tuning process is complete (Block 470 ). Otherwise, the topology tuner agent 20 selects (and removes) an agent 40 from the list (Block 440 ). At Block 450 the topology tuner agent 20 may tailor its recommendation to the selected agent. For example, it may be the case that the selected agent must receive the recommendation in a different form than that of the general recommendation, it being assumed that this type of information may have been obtained along with the agent's directory entry. Another example concerns the case where the recommendation involves only certain types of relationship, and the selected agent is known not to be capable of forming relationships of that type. In this case the topology tuner agent 20 need not send the recommendation at all. At Block 460 the topology tuner agent 20 sends the customized recommendation and proceeds to select another agent 40 from the list.
- topology tuner agent 20 may measure or estimate the topology and/or distance from the desired topology characteristics at interim points while tuning, and thus may terminate the method early. In this case there would be another decision block in the loop, and an alternative exit to Block 470 .
- the recommendations made by the topology tuner agent 20 can take.
- the recommendations can include: (a) “re-form your relationships”, optionally with a relationship category; (b) “select an agent from a provided list”, optionally with a relationship category; and (c)“select an agent not on a provided list”, optionally with a relationship category.
- the list includes one or more agents that the agent 40 currently has a relationship with, then the execution of this latter recommendation can have the effect of causing the agent 40 to break its relationship with one or more other agents 40 that are found on the list, and to form new relationships with other agents.
- the topology tuner agent 20 can tune the network of agent 40 relationships for a number of different purposes. Some non-limiting examples are now presented.
- the topology tuner agent 20 can tune the network of agent 40 relationships to enhance security against a future targeted attack (i.e., an attack that includes the choice of a target). It does this by requesting all or some of the agents 40 to re-form their relationships, without constraining the set of potential partners. The result is a shift toward a random-graph topology.
- a future targeted attack i.e., an attack that includes the choice of a target. It does this by requesting all or some of the agents 40 to re-form their relationships, without constraining the set of potential partners. The result is a shift toward a random-graph topology.
- the topology tuner agent 20 can tune the network of agent 40 relationships to enhance robustness against random failure. It does this by requesting all or some of the agents 40 to re-form their relationships, giving preferential treatment to agents 40 in a selected list.
- the list is generated, and modified as the topology tuner agent 20 performs its assigned task, such that the resulting topology is or approaches that of a scale-free network.
- the topology tuner agent 20 can tune the network of agent 40 relationships to provide protection against an attack on known or suspected target agent(s). It does this by requesting all or some of the agents 40 to re-form their relationships, and selecting partner agents that are not on a list of at-risk agents. The result is a network in which at-risk agents have few relationships, while the remainder of the agents 40 tend toward a random-graph topology.
- the topology tuner agent 20 can tune the network of agent 40 relationships to provide protection against a possible failure of known agents. In a manner similar to the foregoing case, it does this by requesting all or some of the agents 40 to re-form their relationships, and selects partner agents that are not on a list of agents that are at-risk for failure. The result is a network in which at-risk for failure agents have few relationships, while the remainder of the agents 40 tend toward the random-graph topology.
- the topology tuner agent 20 can tune the network of agent 40 relationships to provide for a reduction of “churn” or oscillations in system 10 topology, by reducing the rate of relationship change. This can be accomplished by selecting a subset of agents 40 (or all of the agents 40 ), and requesting those agents 40 in the selected subset to not re-form their relationships with other agents 40 for some specified period of time.
- the topology tuner agent 20 can tune the network of agent 40 relationships to provide increasing system dynamism and responsiveness by increasing the rate of relationship change. This can be accomplished by selecting a subset of agents 40 (or all of the agents 40 ), and requesting those agents 40 in the selected subset to re-form their relationships with other agents 40 . Depending on the frequency of the request, the agents 40 in the selected sub-set will tend to re-form their relationships with other agents at a rate that exceeds the rate of relationship reformation of the general population of the agents 40 .
- FIG. 5 shows a preferred method of making the re-tuning determination, which includes the consideration that the topology of the system 10 may change (or “drift”) on its own, independent of any action performed by the topology tuner agent 20 .
- FIG. 5 thus subsumes the Blocks 240 and 250 of FIG. 2 .
- the topology tuner agent 20 From the start state (Block 500 ), the topology tuner agent 20 first determines at Block 510 whether the topology information it has previously gathered is still sufficiently close to the desired topology.
- One simple technique to make this determination involves comparing a measured statistic, such as the distribution of number of relationships, with a goal statistic.
- the goal statistic may have been obtained in Block 220 of FIG. 2 when the topology tuner agent 20 determined what type of tuning was to be done. It should be noted that the goal may have changed since the last tuning cycle.
- the topology tuner agent 20 estimates whether the actual system 10 may have drifted sufficiently far from the desired topology in the time since the last measurement (Block 520 ).
- the actual method whereby the topology tuner agent 20 estimates the drift in the system 10 topology can be any suitable method, and can incorporate any standard technique for time-series estimation, such as linear forecasting.
- the topology tuner agent 20 begins another tuning cycle by transferring to Block 540 , otherwise the topology tuner agent 20 waits at Block 530 for some period of time.
- the acceptable threshold limit may have changed since the last comparison.
- the system administrator may adjust the threshold to reflect changing high-level goals, or the topology tuner agent may calculate the threshold dynamically.
- the threshold that determines when to begin a new topology tuning cycle may be a variable threshold.
- the period of time may follow a predetermined schedule, or it may be dependent on the estimated drift rate, or it may be dependent on some other parameter or parameters (such as a historical drift rate under some certain set of system 10 conditions).
- the waiting period at Block 530 may be interrupted if the topology tuner agent 20 receives a new topology goal, or if it receives an express notification that the topology has changed.
- the topology tuner agent 20 updates its measured topology information, which corresponds to Block 250 of FIG. 2 .
- the topology tuner agent 20 preferably updates the measured topology information using the same method that it used to gather topology information in the first instance, for example, according to the method of FIG. 3 .
- updating the topology information may differ from the initial information gathering process.
- the topology tuner agent 20 may keep track of how frequently different ones of the agents 40 change their relationships (e.g., it may monitor an agent “fickleness” parameter), and may choose to re-measure the more fickle agents more frequently.
- the topology tuner agent 20 updates its model of the system drift, e.g., by adjusting the estimated linear drift rate, and then returns to Block 510 .
- the decision as to when to begin another tuning cycle can be accomplished by continually updating the topology information, re-calculating statistics, and then initiating another tuning cycle when a statistic or statistics reaches a threshold, or it could be accomplished continuously.
- an aspect of this invention is to execute, in the multi-agent system 10 , the functionality inherent in the topology tuner agent 20 .
- the topology tuner agent 20 gathers statistical information about the relationship-network's topology (such as the degree-distribution of nodes), and then makes recommendations to individual ones of the agents 40 to modify their relationships (if needed).
- the topology tuner agent 20 is preferably endowed with special privileges, giving it sufficient nominal authority to make its recommendations to the other agents 40 effective, but otherwise preferably behaves as a “peer” agent.
- the topology tuner agent 20 preferably uses the same messaging infrastructure as all other agents 40 .
- An aspect of this invention is the operation of the topology tuner agent 20 in gathering information about the network topology of the system 10 , as was described above in relation to Block 210 of FIG. 2 and the method illustrated more specifically in FIG. 3 .
- the topology tuner agent 20 first fetches, preferably from the public directory service(s) 50 and/or 30 , the list of agents 40 in the system 10 , or a sub-set of them. If the relationship information is not inherently provided with the list of agents, then for each agent 40 in the list the topology tuner agent 20 may send a query about that agent's current relationships. As one example, the query may take the form: “tell me who you purchase supplies from”. The query would preferably request information regarding only long-term or recurring relationships.
- the topology tuner agent 20 By asking the agents 40 for their relationships in turn the topology tuner agent 20 gradually assembles a graph of the relationships amongst the agents 40 .
- the graph which may resemble the one shown in FIG. 1 , need not be perfectly accurate, as at least some relationships may typically change while the graph is being assembled, however it is sufficient for use in making approximate statistical inferences, such as determining the degree-distribution and other agent 40 relatedness information.
- the topology tuner agent 20 need not be endowed with any “understanding” of the meaning of the various relationship categories, but only with the ability to identify to which category a given link belongs. As such, the category determination may be based simply on keyword matching.
- the topology tuner agent 20 identifies those agents 40 (i.e., network nodes) with an undesirable property or properties. For example, to make the network more robust against attack, the topology tuner agent 20 locates the nodes with the greatest number of links (of one or more categories) with other nodes. It then finds those “neighbor” agents (i.e., the agents linked to the agent that has been identified), and recommends to one or more of those agents that they link to a different node (i.e., that they link to a different one of the agents 40 ).
- agents 40 i.e., network nodes
- the topology tuner agent 20 locates the nodes with the greatest number of links (of one or more categories) with other nodes. It then finds those “neighbor” agents (i.e., the agents linked to the agent that has been identified), and recommends to one or more of those agents that they link to a different node (i.e., that they link to a different one of the agents 40 ).
- This recommendation may take several forms, from expressly identifying a particular one of the agents 40 to link to, to identifying a set of preferred agents 40 to link to, or to simply requesting that the agent break the existing link and select any other agent to link to according to its own preferences.
- the topology tuner agent 20 also requests that each neighbor agent return, to the topology tuner agent 20 , a ranked list of alternate agents that the neighbor agent would find acceptable. Using this returned list, the topology tuner agent 20 is enabled to select one or more other agents that a particular agent 40 would find preferable. However, the topology tuner agent 20 is not obligated to offer a particular agent 40 one of its preferred agents to form a relationship with, as the topology tuner agent 20 may have knowledge that the preferred agent 40 is actually one that is a probable target for an attack, or a probable candidate for a failure.
- An aspect of this invention involves a consideration of, and a compensation for, system 10 dynamics.
- the agents 40 in the system 10 are carrying out their assigned tasks. This implies that the network of relationships is most likely continually changing, independent of the activities of the topology tuner agent 20 . It is thus preferred that the topology tuner agent 20 incorporate the dynamics of the system 10 into its internal model.
- the topology tuner agent 20 may revisit the agents 40 from time to time in order to update the acquired information about the network of relationships.
- the topology tuner agent 20 can use the updated information to measure the extent to which the statistical properties of the network topology have changed since the last update, and therefore arrive at an estimated overall rate of change in the statistics. This rate of change can then be used to determine a minimum or an optimal frequency at which the topology tuner agent 20 should revisit the agents 40 in the system 10 to determine their current relationships, and consequently the frequency at which it must issue or reissue recommendations to the agents 40 in the system 10 .
- topology tuning function need not be implemented as the software agent 20 , but could, instead, be implemented as a part of the hosting environment, such as by an entity that resides in the hosting environment.
- the foregoing description of the topology tuner agent 20 has assumed that there is no centralized control of the system 10 , and possibly no centrally stored information that is descriptive of the topological properties of the agent 40 relationships. However, the topology tuner agent 20 may also be of use in situations where there is some degree of centralized control and/or centrally stored information.
- the agents 40 in a multi-agent system 10 may have been programmed to follow a common set of policies.
- these policies specify a core set of common behaviors to which the agents 40 must conform, but do not fully specify the behavior of each individual one of the agents 40 .
- the agents 40 can obtain updates to the common set of policies from time to time, and change their behavior accordingly.
- the recommendations of the topology tuner agent 20 may be incorporated into the common set of core policies and transmitted to the other agents 40 by means of a policy update, rather than by direct interaction between the topology tuner agent 20 and the agents 40 of the system 10 .
Abstract
Description
Claims (49)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/726,724 US7483986B2 (en) | 2003-12-03 | 2003-12-03 | Dynamically tuning networks of relationships in self-organizing multi-agent systems |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/726,724 US7483986B2 (en) | 2003-12-03 | 2003-12-03 | Dynamically tuning networks of relationships in self-organizing multi-agent systems |
Publications (2)
Publication Number | Publication Date |
---|---|
US20050125520A1 US20050125520A1 (en) | 2005-06-09 |
US7483986B2 true US7483986B2 (en) | 2009-01-27 |
Family
ID=34633372
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/726,724 Active 2026-03-28 US7483986B2 (en) | 2003-12-03 | 2003-12-03 | Dynamically tuning networks of relationships in self-organizing multi-agent systems |
Country Status (1)
Country | Link |
---|---|
US (1) | US7483986B2 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100057902A1 (en) * | 2008-08-28 | 2010-03-04 | Novell, Inc. | Scal-free management networks |
US9043920B2 (en) | 2012-06-27 | 2015-05-26 | Tenable Network Security, Inc. | System and method for identifying exploitable weak points in a network |
US9088606B2 (en) | 2012-07-05 | 2015-07-21 | Tenable Network Security, Inc. | System and method for strategic anti-malware monitoring |
US9467464B2 (en) | 2013-03-15 | 2016-10-11 | Tenable Network Security, Inc. | System and method for correlating log data to discover network vulnerabilities and assets |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050132032A1 (en) * | 2003-12-15 | 2005-06-16 | Bertrand Daniel W. | Autonomous agent-based system management |
US20060159024A1 (en) * | 2005-01-18 | 2006-07-20 | Hester Lance E | Method and apparatus for responding to node anormalities within an ad-hoc network |
US8577761B1 (en) * | 2005-06-30 | 2013-11-05 | Oracle America, Inc. | System and method for dynamic offering topologies |
US20070050756A1 (en) * | 2005-08-24 | 2007-03-01 | Nokia Corporation | Component architecture |
US20070271130A1 (en) * | 2006-05-19 | 2007-11-22 | Microsoft Corporation | Flexible scheduling and pricing of multicore computer chips |
US20080040178A1 (en) * | 2006-07-06 | 2008-02-14 | Oslo | Method of assigning a set of resources to multiple agents |
US7885204B1 (en) * | 2006-08-11 | 2011-02-08 | Cisco Technology, Inc. | Method and system for testing network topology |
US9569330B2 (en) | 2007-06-22 | 2017-02-14 | Red Hat, Inc. | Performing dependency analysis on nodes of a business application service group |
US8984504B2 (en) | 2007-06-22 | 2015-03-17 | Red Hat, Inc. | Method and system for determining a host machine by a virtual machine |
US8191141B2 (en) | 2007-06-22 | 2012-05-29 | Red Hat, Inc. | Method and system for cloaked observation and remediation of software attacks |
US9477572B2 (en) | 2007-06-22 | 2016-10-25 | Red Hat, Inc. | Performing predictive modeling of virtual machine relationships |
US9354960B2 (en) | 2010-12-27 | 2016-05-31 | Red Hat, Inc. | Assigning virtual machines to business application service groups based on ranking of the virtual machines |
US9727440B2 (en) | 2007-06-22 | 2017-08-08 | Red Hat, Inc. | Automatic simulation of virtual machine performance |
US8539570B2 (en) * | 2007-06-22 | 2013-09-17 | Red Hat, Inc. | Method for managing a virtual machine |
US9678803B2 (en) | 2007-06-22 | 2017-06-13 | Red Hat, Inc. | Migration of network entities to a cloud infrastructure |
US8429748B2 (en) * | 2007-06-22 | 2013-04-23 | Red Hat, Inc. | Network traffic analysis using a dynamically updating ontological network description |
EP2027896A1 (en) * | 2007-08-20 | 2009-02-25 | BARRET DE NAZARIS, Lionel Bruno | Simulation program and method for dynamic urban environment modeling |
US20100241690A1 (en) * | 2009-03-20 | 2010-09-23 | Microsoft Corporation | Component and dependency discovery |
JP5844373B2 (en) * | 2010-09-17 | 2016-01-13 | オラクル・インターナショナル・コーポレイション | System and method for facilitating protection from runaway subnet manager instances in a middleware machine environment |
US8713649B2 (en) | 2011-06-03 | 2014-04-29 | Oracle International Corporation | System and method for providing restrictions on the location of peer subnet manager (SM) instances in an infiniband (IB) network |
US9930018B2 (en) | 2011-06-03 | 2018-03-27 | Oracle International Corporation | System and method for providing source ID spoof protection in an infiniband (IB) network |
US9537719B2 (en) * | 2014-06-19 | 2017-01-03 | Palo Alto Research Center Incorporated | Method and apparatus for deploying a minimal-cost CCN topology |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5091920A (en) * | 1989-11-10 | 1992-02-25 | Fujitsu Limited | Threshold valve control system in a receiver circuit |
US6061735A (en) | 1997-10-23 | 2000-05-09 | Mci Communications Corporation | Network restoration plan regeneration responsive to network topology changes |
US20030046583A1 (en) * | 2001-08-30 | 2003-03-06 | Honeywell International Inc. | Automated configuration of security software suites |
US6697325B1 (en) * | 1999-12-07 | 2004-02-24 | Nortel Networks Limited | System, device, and method for expediting reconvergence in a communication network |
US20040044891A1 (en) * | 2002-09-04 | 2004-03-04 | Secure Computing Corporation | System and method for secure group communications |
US20040059812A1 (en) * | 2000-12-14 | 2004-03-25 | Shmuel Assa | Topology information system for a managed world |
US20040081166A1 (en) * | 2002-05-01 | 2004-04-29 | Stanforth Peter J. | System and method for using an ad-hoc routing algorithm based on activity detection in an ad-hoc network |
US20040117624A1 (en) * | 2002-10-21 | 2004-06-17 | Brandt David D. | System and methodology providing automation security analysis, validation, and learning in an industrial controller environment |
US20040218582A1 (en) * | 2003-04-30 | 2004-11-04 | Harris Corporation | Predictive route maintenance in a mobile ad hoc network |
US20050080894A1 (en) * | 2003-10-09 | 2005-04-14 | John Apostolopoulos | Method and system for topology adaptation to support communication in a communicative environment |
US6882627B2 (en) * | 2001-06-14 | 2005-04-19 | Tropic Networks | Methods and apparatus for selecting multiple paths taking into account shared risk |
US7013395B1 (en) * | 2001-03-13 | 2006-03-14 | Sandra Corporation | Method and tool for network vulnerability analysis |
US7031321B2 (en) * | 2001-06-11 | 2006-04-18 | Koninklijke Philips Electronics N.V. | Dynamic network and routing method for a dynamic network |
US7184421B1 (en) * | 2001-12-21 | 2007-02-27 | Itt Manufacturing Enterprises, Inc. | Method and apparatus for on demand multicast and unicast using controlled flood multicast communications |
-
2003
- 2003-12-03 US US10/726,724 patent/US7483986B2/en active Active
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5091920A (en) * | 1989-11-10 | 1992-02-25 | Fujitsu Limited | Threshold valve control system in a receiver circuit |
US6061735A (en) | 1997-10-23 | 2000-05-09 | Mci Communications Corporation | Network restoration plan regeneration responsive to network topology changes |
US6697325B1 (en) * | 1999-12-07 | 2004-02-24 | Nortel Networks Limited | System, device, and method for expediting reconvergence in a communication network |
US20040059812A1 (en) * | 2000-12-14 | 2004-03-25 | Shmuel Assa | Topology information system for a managed world |
US7013395B1 (en) * | 2001-03-13 | 2006-03-14 | Sandra Corporation | Method and tool for network vulnerability analysis |
US7031321B2 (en) * | 2001-06-11 | 2006-04-18 | Koninklijke Philips Electronics N.V. | Dynamic network and routing method for a dynamic network |
US6882627B2 (en) * | 2001-06-14 | 2005-04-19 | Tropic Networks | Methods and apparatus for selecting multiple paths taking into account shared risk |
US20030046583A1 (en) * | 2001-08-30 | 2003-03-06 | Honeywell International Inc. | Automated configuration of security software suites |
US7184421B1 (en) * | 2001-12-21 | 2007-02-27 | Itt Manufacturing Enterprises, Inc. | Method and apparatus for on demand multicast and unicast using controlled flood multicast communications |
US20040081166A1 (en) * | 2002-05-01 | 2004-04-29 | Stanforth Peter J. | System and method for using an ad-hoc routing algorithm based on activity detection in an ad-hoc network |
US20040044891A1 (en) * | 2002-09-04 | 2004-03-04 | Secure Computing Corporation | System and method for secure group communications |
US20040117624A1 (en) * | 2002-10-21 | 2004-06-17 | Brandt David D. | System and methodology providing automation security analysis, validation, and learning in an industrial controller environment |
US20040218582A1 (en) * | 2003-04-30 | 2004-11-04 | Harris Corporation | Predictive route maintenance in a mobile ad hoc network |
US20050080894A1 (en) * | 2003-10-09 | 2005-04-14 | John Apostolopoulos | Method and system for topology adaptation to support communication in a communicative environment |
Non-Patent Citations (3)
Title |
---|
C. Bettstetter. On The Minimum Node Degree and Connectivity of a Wireless Multihop Network. Technische Universitat Munchen. MOBIHOC'02. Jun. 9-11, 2002. * |
M. J. Keeling, The Effects of Local Spatial Structure on Epidemiological Invasions, The Royal Society, pp. 859-867. |
Réka Albert, Hawoong Jeong and Albert-László Barbási, Error and Attach Tolerance of Complex Networks, Nature: vol. 406, Jul. 27, 2000, pp. 378-381. |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100057902A1 (en) * | 2008-08-28 | 2010-03-04 | Novell, Inc. | Scal-free management networks |
US9043920B2 (en) | 2012-06-27 | 2015-05-26 | Tenable Network Security, Inc. | System and method for identifying exploitable weak points in a network |
US9860265B2 (en) | 2012-06-27 | 2018-01-02 | Tenable Network Security, Inc. | System and method for identifying exploitable weak points in a network |
US9088606B2 (en) | 2012-07-05 | 2015-07-21 | Tenable Network Security, Inc. | System and method for strategic anti-malware monitoring |
US10171490B2 (en) | 2012-07-05 | 2019-01-01 | Tenable, Inc. | System and method for strategic anti-malware monitoring |
US9467464B2 (en) | 2013-03-15 | 2016-10-11 | Tenable Network Security, Inc. | System and method for correlating log data to discover network vulnerabilities and assets |
Also Published As
Publication number | Publication date |
---|---|
US20050125520A1 (en) | 2005-06-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7483986B2 (en) | Dynamically tuning networks of relationships in self-organizing multi-agent systems | |
US8180922B2 (en) | Load balancing mechanism using resource availability profiles | |
US7409593B2 (en) | Automated diagnosis for computer networks | |
US8024450B1 (en) | System and method for remote administration of computer network | |
US6871233B1 (en) | Method and apparatus for use in specifying and insuring service-level quality of service in computer networks | |
US20070067845A1 (en) | Application of cut-sets to network interdependency security risk assessment | |
US9203857B2 (en) | Method and system for detecting anomaly of user behavior in a network | |
WO2002019077A2 (en) | Probabilistic alert correlation | |
US20070094323A1 (en) | Managed resource sharing method and apparatus | |
US20220201490A1 (en) | Method and device for processing an alert message indicating the detection of an anomaly in traffic transmitted via a network | |
Monge et al. | Detection of economic denial of sustainability (EDoS) threats in self-organizing networks | |
KR20160147957A (en) | Verification in self-organizing networks | |
KR20130129408A (en) | Method and system for trust management in distributed computing systems | |
US20220377582A1 (en) | Predicting the likelihood of subscriber churn | |
US20210344723A1 (en) | Distributed network application security policy generation and enforcement for microsegmentation | |
Abderrahim et al. | DTMS-IoT: A Dirichlet-based trust management system mitigating On-Off attacks and dishonest recommendations for the Internet of Things | |
Li et al. | Hit and run: A bayesian game between malicious and regular nodes in manets | |
US11930380B2 (en) | Intelligent monitoring systems and methods for Wi-Fi metric-based ISP outage detection for cloud based Wi-Fi networks | |
US11595292B2 (en) | Dynamic node cluster discovery in an unknown topology graph | |
CN115051935A (en) | Network asset state monitoring method | |
US20100153543A1 (en) | Method and System for Intelligent Management of Performance Measurements In Communication Networks | |
CN109922449A (en) | Data informationization acquisition, management and analysis system and method | |
Frenzel et al. | Operational troubleshooting-enabled coordination in self-organizing networks | |
US20220014446A1 (en) | Network device association with network management system | |
US20240098525A1 (en) | Intelligent monitoring systems and methods for cloud-based wi-fi |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HANSON, JAMES E.;WHALLEY, IAN NICHOLAS;REEL/FRAME:014778/0534 Effective date: 20031202 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
REMI | Maintenance fee reminder mailed | ||
FPAY | Fee payment |
Year of fee payment: 4 |
|
SULP | Surcharge for late payment | ||
FPAY | Fee payment |
Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FEPP | Fee payment procedure |
Free format text: 11.5 YR SURCHARGE- LATE PMT W/IN 6 MO, LARGE ENTITY (ORIGINAL EVENT CODE: M1556); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |
|
AS | Assignment |
Owner name: MAPLEBEAR INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:055155/0943 Effective date: 20210126 |